A couple of weeks ago, a satirical online publication, The Onion, had their Google Apps and Twitter account hacked. They could have simply acknowledged the attack and insisted measures were being taken to prevent it from happening again, but they took the time to describe exactly HOW they were hacked and how others can prevent it from happening to them.
\”OMG! My email is hacked!\” This is a true account of an email hack we\’ve just witnessed and helped a client through. It all started with one of our client\’s bank account manager calling our client (will call him Bob in this email): Bank: Bob, Happy New Year! We have received an email from your …
If you own and operate a small business, lowering costs is an important part of keeping your company in the black. Cutting costs on your IT budget could inadvertently compromise your company’s security. Even though small businesses may not have all of the resources that large corporations do, they are still just as vulnerable to the same security threats. Here are ways to help secure your small business:
At least most internet users are becoming more wary of phishing email messages. The attackers are countering by increasing the sophistication their attacks and by targeting them to the interests of specific individuals.
Phishing is alive and well. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
In light of reduced SPAM as of late, I was somewhat surprised to see phishing and theft attempts as sophisticated as this come through to my inboxes today – at least one in each of my different email addresses, but all came from email accounts of friends on Facebook. I searched the major anti-virus and malware vendors as well as google and twitter and nothing turned up, so maybe I\’m just one of the first to be hit.
\’Tis the season – well, almost. Gadgets and cool new technology are high on the wish lists of many shoppers. Here is a list of pitfalls and scams from McAfee that shoppers should be looking out for.
This morning I received a phishing email supposedly from QuickBooks, warning me that I would no longer be able to access my QuickBooks without first downloading their new Intuit Security Tool. I see some of you smirking already, and you\’re right – I wasn\’t fooled for a moment. But think of how many non-techies WILL be fooled by such an email?
Think worms are the malware of yesteryear? Not so. A new worm has been spreading rapidly. This worm spreads via RDP (remote desktop connection).
This worm does not seem to be exploiting any new vulnerabilities in the RDP protocol. Rather, it gets its foothold in the internal network through other means, such as Adobe flash or Reader vulnerabilities or general phishing attacks.
High profile breaches do not necessarily result from sophisticated attacks. Many of them are the result of fairly simple social engineering or phishing attacks. These can usually be prevented by educating users and making them aware of these kinds of threats.